|
COURSES
| Secure Architectures and Fault-Resilient EnginesS.A.F.E.
Dr. Fernando C. Colon Osorio
|
Table 1 Unsolved Hacks - The people who stole credit card numbers from
these major online merchants are still at large. |
||||||||||
|
|
|
|
|
||||||
|
Company |
|
|
|
Date |
|
|
|
What they stole;
additional crimes |
|
|
|
|
|
|
||||||
|
|
|
|
|
||||||
|
Playboy.com |
|
|
Nov 2001 |
|
|
Undisclosed number of credit
card numbers; extortion |
|
||
|
|
|
||||||||
|
Ecount |
|
|
Aug 2001 |
|
|
Personal customer
information; extortion |
|
||
|
|
|
||||||||
|
Western Union |
|
|
Sep 2000 |
|
|
15,000 card numbers |
|
||
|
|
|
||||||||
|
Creditcards.com |
|
|
Dec 2000 |
|
|
55,000 card numbers exposed
on the Web; extortion |
|
||
|
|
|
||||||||
|
Egghead.com |
|
|
Dec 2000 |
|
|
3.7 million credit cards
threatened* |
|
||
|
|
|
||||||||
|
CD Universe |
|
|
Jan 2000 |
|
|
350,000 card numbers posted
online; extortion |
|
||
|
||||||||||
|
||||||||||
|
* Egghead announced that a
hacker had accessed its computer system, "potentially including (its)
customer databases." |
The nature and cost of
these threats has contributed to the increased focus, increase research and
development in both Academia and Industry in the design and implementation of
systems that are immune to crackers attack.
More specifically, dating back to the early ninety the study, research
and development, and the implementation of Intrusion Detection Systems (IDS)
has become an essential element of the design of modern computer systems and
applications.
In the next section we
formally defined Intrusion Detection Systems, established both the strengths and
weaknesses of current approaches to the problem, and suggest a new model to
attack the problem. This new model,
we called it an Intrusion Detection and Countermeasure system (IDC System),
utilizes well know solutions to a set of related problems creating a fresh new
practical approach.
Systems Security - CS525 - 191F |
Spring 2003 - Tuesdays and Thursdays 12:30 to 14:00 | |
Fall 2003 |
Talks @ PEDS
Intrusion Detection & Countermeasures Systems - Part I
Intrusion Detection & Countermeasures System - Part II